Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2185505.2185512acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article

A dynamic game-theoretic approach to resilient control system design for cascading failures

Published: 17 April 2012 Publication History

Abstract

The migration of many current critical infrastructures, such as power grids and transportations systems, into open public networks has posed many challenges in control systems. Modern control systems face uncertainties not only from the physical world but also from the cyber space. In this paper, we propose a hybrid game-theoretic approach to investigate the coupling between cyber security policy and robust control design. We study in detail the case of cascading failures in industrial control systems and provide a set of coupled optimality criteria in the linear-quadratic case. This approach can be further extended to more general cases of parallel cascading failures.

References

[1]
S. Gorman, "Electricity Grid in U.S. Penetrated By Spies," Wall Street Journal, April 8, 2009, http://online.wsj.com/article/SB123914805204099085.html, Retrieved Aug. 16, 2011.
[2]
B. Krebs, "Cyber Incident Blamed for Nuclear Power Plant Shutdown", Washington Post, June 5, 2008, http://www.washingtonpost.com/wp-dyn/content/article/2008/06/05/AR2008060501958.html, Retrieved Aug. 16, 2011.
[3]
S. Greengard, "The New Face of War", Communications of the ACM, Dec. 2010, vol. 53, no. 12, pp. 20--22.
[4]
McMillan, "Siemens: Stuxnet worm hit industrial systems," Computerworld, Sept. 16, 2010, http://www.computerworld.com/s/article/print/9185419, Retrieved Aug. 16, 2011.
[5]
D. P. Nedic, I. Dobson, D. S. Kirschen, B. A. Carreras, V. E. Lynch, "Criticality in a cascading failure blackout model," Intl. J. of Electrical Power and Energy Systems, vol. 28, 2006, pp. 627--633.
[6]
J. Chen, J. S. Thorp, I. Dobson, "Cascading dynamics and mitigation assessment in power system disturbances via a hidden failure model," Intl. J. of Electrical Power and Energy Systems, vol. 27, no. 4, May 2005, pp. 318--326.
[7]
J. Asha and D. Newth, "Optimizing complex networks for resilience against cascading failure," Physica A, vol. 380, pp. 673--683, 2007.
[8]
P. Crucitti, V. Latora and M. Marchiori, "Model for cascading failures in complex networks," Phys. Rev. E, vol. 69, 045104(R), 2004.
[9]
R. Hollnagel, D. D. Woods, N. Leveson (eds.), "Resilience engineering: concepts and precepts," Ashgate Publishing Company, 2006.
[10]
E. Hollnagel, J. Pariès, D. D. Woods and J. Wreathall, "Resilience Engineering in Practice," Ashgate Publishing Company, 2011.
[11]
Y. Y. Haimes, "On the definition of resilience in systems," Risk Analysis, vol. 29, no. 4, 2009.
[12]
L. Mili, "Taxonomy of the characteristics of power system operating states," 2nd NSF-VT Resilient and Sustainable Critical Infrastructures (RESIN) Workshop, Tuscon, Arizona, January 13-15, 2011.
[13]
D. Zhu, C. Rieger and T. Başar, "A hierarchical security architecture for cyber-physical systems," in Proc. of Intl. Symposium on Resilient Control Systems (ISRCS), Boise, ID, Aug. 9 - 11, 2011.
[14]
D. Wei and K. Ji, "Resilient industrial control system (RICS): Concepts, formulation, metrics, and insights," in Proc. of 3rd Intl. Symp. on Resilient Control Systems (ISRCS), 2010.
[15]
Q. Zhu and T. Başar, "A hierarchical security architecture for smart grid," In Z. Han, E. Hossain and V. Poor (Eds.), Smart Grid Communications and Networking, Cambridge University Press, 2012.
[16]
C. G. Rieger, D. I. Gertman, and M. A. McQueen, "Resilient control systems: next generation design research," In Proc. of the 2nd Conf. on Human System interactions, Catania, Italy, May 21-23, 2009, pp. 629--633.
[17]
T. Başar and P. Bernhard, H-infinity Optimal Control and Related Minimax Design Problems: A Dynamic Game Approach, Birkhäuser, 1995.
[18]
Q. Zhu and T. Başar, "Robust and resilient control design for cyber-physical systems with an application to power systems," in Proc. of 50th IEEE Conference on Decision and Control and European Control Conference, Orlando, Florida, Dec. 12-15, 2011.
[19]
Q. Zhu and T. Başar, "Towards a unifying security framework for cyber-physical systems," in Proc. of Workshop on the Foundations of Dependable and Secure Cyber-Physical Systems (FDSCPS-11), CPSWeek 2011, Chicago.
[20]
Q. Zhu and T. Başar, "Indices of power in optimal IDS default configuration: theory and examples," in Proc. of 2nd Conference on Decision and Game Theory (GameSec 2011), College Park, MD, USA. Nov. 14 - 15, 2011.
[21]
Q. Zhu, H. Tembine and T. Başar, "Network security configuration: a nonzero-sum stochastic game approach," in Proc. of 2010 American Control Conference (ACC), June 30 - July 2, 2010, pp. 1059--1064.
[22]
Q. Zhu and T. Başar, "Dynamic policy-based IDS configuration," in Proc. of 48th IEEE Conference on Decision and Control, Shanghai, China, Dec. 2009, Dec. 15-18, 2009, pp. 8600--8605.
[23]
C.-W.Ten, C.-C. Liu and M. Govindarasu, "Vulnerability assessment of cybersecurity for SCADA systems using attack trees," Power Engineering Society General Meeting, 24-28 June 2007, pp. 1--8.
[24]
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. Wing, "Automated generation and analysis of attack graphs," IEEE Symposium on Security and Privacy, 2002, pp. 273--284.
[25]
J. F. Nash, "Equilibrium points in n-person games PNAS," January 1, 1950 vol. 36 no. 1 pp. 48--49.
[26]
T. Başar and G. J. Olsder, Dynamic Noncooperative Game Theory, SIAM Series in Classics in Applied Mathematics, Philadelphia, January 1999.
[27]
Digital Bond, http://www.digitalbond.com/tools/quickdraw/, last accessed on Feb. 20, 2012.

Cited By

View all
  • (2024)A Physical-Layer Security Cooperative Framework for Mitigating Interference and Eavesdropping Attacks in Internet of Things EnvironmentsSensors10.3390/s2416517124:16(5171)Online publication date: 10-Aug-2024
  • (2023)Resilience analysis of cyber‐physical systems: A review of models and methodsRisk Analysis10.1111/risa.1408943:11(2359-2379)Online publication date: 16-Jan-2023
  • (2023)Coordinated Security Measures for Industrial IoT Against Eavesdropping2023 IEEE Texas Power and Energy Conference (TPEC)10.1109/TPEC56611.2023.10078577(1-5)Online publication date: 13-Feb-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HiCoNS '12: Proceedings of the 1st international conference on High Confidence Networked Systems
April 2012
96 pages
ISBN:9781450312639
DOI:10.1145/2185505
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 April 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cyber-physical systems
  2. differential games
  3. game theory
  4. markov games
  5. nash equilibrium

Qualifiers

  • Research-article

Conference

HiCoNS '12
Sponsor:

Acceptance Rates

Overall Acceptance Rate 30 of 55 submissions, 55%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)20
  • Downloads (Last 6 weeks)2
Reflects downloads up to 27 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Physical-Layer Security Cooperative Framework for Mitigating Interference and Eavesdropping Attacks in Internet of Things EnvironmentsSensors10.3390/s2416517124:16(5171)Online publication date: 10-Aug-2024
  • (2023)Resilience analysis of cyber‐physical systems: A review of models and methodsRisk Analysis10.1111/risa.1408943:11(2359-2379)Online publication date: 16-Jan-2023
  • (2023)Coordinated Security Measures for Industrial IoT Against Eavesdropping2023 IEEE Texas Power and Energy Conference (TPEC)10.1109/TPEC56611.2023.10078577(1-5)Online publication date: 13-Feb-2023
  • (2023)Cooperative Transmission Strategy for Industrial IoT Against Interference Attacks2023 IEEE Texas Power and Energy Conference (TPEC)10.1109/TPEC56611.2023.10078488(1-6)Online publication date: 13-Feb-2023
  • (2023)Artificial Intelligence in Manufacturing ProcessesA Perspective on Artificial Intelligence in Manufacturing10.1007/978-3-031-21828-6_2(15-39)Online publication date: 1-Jan-2023
  • (2022)Mitigating Cascading Failures in Power Grids via Markov Decision-Based Load-Shedding With DC Power Flow ModelIEEE Systems Journal10.1109/JSYST.2022.317535916:3(4048-4059)Online publication date: Sep-2022
  • (2021)A Physical-Layer Security Approach for IoT Against Jamming Interference Attacks2021 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)10.1109/CCECE53047.2021.9569143(1-6)Online publication date: 12-Sep-2021
  • (2021)The safety region-based model predictive control for discrete-time systems under deception attacksInternational Journal of Systems Science10.1080/00207721.2021.1879965(1-17)Online publication date: 16-Feb-2021
  • (2021)Discussing resilience in the context of cyber physical systemsComputers and Industrial Engineering10.1016/j.cie.2021.107534160:COnline publication date: 1-Oct-2021
  • (2020)A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure NetworkIEEE Transactions on Information Forensics and Security10.1109/TIFS.2019.292413015(462-474)Online publication date: 2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media